摘要:
Provided are transmitter topology, receiver topology and methods for generating and transmitting a radio signal at a transmitter and detecting and processing a radio signal at a receiver. The radio signals are transmitted across a wireless interface using Ultra Wideband (UWB) pulses. A transmitted reference approach is utilized. The radio signal include pairs of UWB pulses with each pair of pulses separated by a fixed time delay. The two pulses are then combined to provide for improved noise immunity.
摘要:
Contents of a memory are encrypted using an encryption key that is generated based on a random number and a memory location at which the contents are stored. Each of a plurality of locations of a memory can be associated with a respective unique pointer value, and an encryption key may be generated based on the unique pointer value and the random number. In some examples, the random number is unique to a power-up cycle of a system comprising the memory or is generated based on a time at which the data to be stored by the memory at the selected memory location is written to the memory.
摘要:
A system may include circuitry and a magnetoresistive random access memory (MRAM) die including at least one MRAM cell. The circuitry may be configured to detect attempted tampering with the MRAM die and generate a signal based on the detected attempted tampering. The signal may be sufficient to damage or destroy at least one layer of the at least one MRAM cell or a fuse electrically connected to a read line of the at least one MRAM cell.
摘要:
A magnetoresistive random access memory (MRAM) die may include an MRAM cell, a reservoir defined by the MRAM die, and a chemical disposed in the reservoir. At least one boundary of the reservoir may be configured to be damaged in response to attempted tampering with the MRAM die, such that at least some of the chemical is released from the reservoir when the at least one boundary of the reservoir is damaged. In some examples, at least some of the chemical is configured to contact and alter or damage at least a portion of the MRAM cell when the chemical is released from the reservoir.
摘要:
In some examples, an integrated circuit system includes a plurality of integrated circuit layers. At least one of the integrated circuit layers includes an integrated circuit die, which may not include any through-silicon vias that provide a pathway to an adjacent integrated circuit layer, and an interposer portion, which includes electrically conductive through-vias. The interposer portion may facilitate communication of the integrated circuit die with other integrated circuit layers of the integrated circuit system. In some examples, the stacked integrated circuit system may include more than one integrated circuit die, which may be in the same integrated circuit layer as at least one other integrated circuit die, or may be in a different integrated circuit layer.
摘要:
This disclosure describes techniques that may prevent cryptographic devices, including both encryption devices and decryption devices, from producing a power signature that can be used by attackers to deconstruct a cryptographic algorithm and extract a cryptographic key. The techniques may include an external power supply charging an internal, dedicated power storage element; temporarily gating off the encryption device from the external power supply; configuring a cryptographic logic unit to perform a cryptographic algorithm from power stored in the power storage element while the external power source is gated off; and then recharging the power storage element upon the cryptographic logic unit completing an iteration of the cryptographic algorithm.
摘要:
A system for protecting a plurality of networked security devices is disclosed. The system includes a plurality of connectors, a plurality of security containers coupled together by the plurality of connectors, and a plurality of sensors, whereby at least one sensor of the plurality of sensors is disposed in at least one security container of the plurality of security containers, and the plurality of sensors are adapted to detect a threat to each security container of the plurality of security containers. The system also includes a plurality of monitoring devices, whereby each monitoring device of the plurality of monitoring devices is coupled to at least one sensor of the plurality of sensors, and the plurality of monitoring devices are adapted to monitor the plurality of sensors and activate protective measures in response to at least one detected threat.
摘要:
A cooking apparatus ventilation system which evacuates smoke and vapors to allow indoor cooking. Air is evacuated through ventilation channels which surround all but one side of the cooking surface. A layer of air is directed from the fourth side across the cooking surface to push the smoke and vapor into the ventilation channels. A portion of the evacuated air is recycled back across the cooking surface to enhance the flavor of the food being cooked.
摘要:
A cooking apparatus ventilation system which evacuates smoke and vapors to allow indoor cooking. Air is evacuated through ventilation channels which surround all but one side of the cooking surface. A layer of air is directed from the fourth side across the cooking surface to push the smoke and vapor into the ventilation channels.
摘要:
A device is described for positioning a reinforcing cage within a cylindrical concrete pipe form. The device comprises a horizontally movable slide which may be moved inwardly into the form for engagement with the cage. A cam is secured to the slide for moving the slide inwardly and outwardly relative to the form. An air cylinder is pivotally connected to the cam for pivotally moving the cam. An adjustable stop is located in the pivotal path of the cam to limit the inward movement of the slide. A plurality of the devices are mounted on the form in a radially spaced and vertically spaced manner.